|
|
|
|
LEADER |
01941nmm a2200409 u 4500 |
001 |
EB000388082 |
003 |
EBX01000000000000000241134 |
005 |
00000000000000.0 |
007 |
cr||||||||||||||||||||| |
008 |
130626 ||| eng |
020 |
|
|
|a 9783642248610
|
100 |
1 |
|
|a Lai, Xuejia
|e [editor]
|
245 |
0 |
0 |
|a Information Security
|h Elektronische Ressource
|b 14th International Conference, ISC 2011, Xi'an, China, October 26-29, 2011, Proceedings
|c edited by Xuejia Lai, Jianying Zhou, Hui Li
|
250 |
|
|
|a 1st ed. 2011
|
260 |
|
|
|a Berlin, Heidelberg
|b Springer Berlin Heidelberg
|c 2011, 2011
|
300 |
|
|
|a XIII, 388 p
|b online resource
|
653 |
|
|
|a Computer science / Mathematics
|
653 |
|
|
|a Cryptography
|
653 |
|
|
|a Algorithms
|
653 |
|
|
|a Application software
|
653 |
|
|
|a Mathematical Applications in Computer Science
|
653 |
|
|
|a Data protection
|
653 |
|
|
|a Data encryption (Computer science)
|
653 |
|
|
|a Cryptology
|
653 |
|
|
|a Computer and Information Systems Applications
|
653 |
|
|
|a Data and Information Security
|
653 |
|
|
|a Special Purpose and Application-Based Systems
|
653 |
|
|
|a Computers, Special purpose
|
700 |
1 |
|
|a Zhou, Jianying
|e [editor]
|
700 |
1 |
|
|a Li, Hui
|e [editor]
|
041 |
0 |
7 |
|a eng
|2 ISO 639-2
|
989 |
|
|
|b Springer
|a Springer eBooks 2005-
|
490 |
0 |
|
|a Security and Cryptology
|
028 |
5 |
0 |
|a 10.1007/978-3-642-24861-0
|
856 |
4 |
0 |
|u https://doi.org/10.1007/978-3-642-24861-0?nosfx=y
|x Verlag
|3 Volltext
|
082 |
0 |
|
|a 005.8
|
520 |
|
|
|a This book constitutes the refereed proceedings of the 14th International Conference on Information Security, ISC 2011, held in Xi'an, China, in October 2011. The 25 revised full papers were carefully reviewed and selected from 95 submissions. The papers are organized in topical sections on attacks; protocols; public-key cryptosystems; network security; software security; system security; database security; privacy; digital signatures
|